Follow Dark Reading:
 March 29, 2016
LATEST SECURITY NEWS & COMMENTARY
Like It Or Not, Firewalls Still Front And Center
Firewalls are still central to most network defense strategies, new State of the Firewall report says.
Most Federal Agencies Have Suffered A Data Breach
Vormetric report indicates that security spending in federal agencies hampers modern security techniques to safeguard critical data.
Chinese National Pleads Guilty In US Defense Contractor Hacking Case
Su Bin, a Chinese businessman, pleaded guilty before US District Judge for stealing sensitive military information from American defense contractors' computer networks.
Iran Counters US Hacking Indictments Of 7 Iranians
Foreign ministry spokesperson reportedly argues US has no 'evidence' of the alleged attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Hot Cybersecurity Startups: MACH37's Spring Class Of 2016
Intense 90-day program mentors budding entrepreneurs in the finer points of developing a viable technology business for the real world of information security.

Dangerous New USB Trojan Discovered
'USB Thief' could be used for targeted purposes, researchers at ESET say.

How 4 Startups Are Harnessing AI In The Invisible Cyberwar
Cybersecurity startups are setting their scopes on a potential goldmine of automated systems they hope will be more effective than hiring human enterprise security teams.

MORE
IN CASE YOU MISSED IT

7 Elements Of Modern Endpoint Security

What it takes to secure and tap into the 'source of the truth' in today's threatscape.


Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Think Like an Attacker, Reach your Security Goals & Improve your Threat Visibility

    Dark Reading invites you to join us for a special one-hour webinar featuring leading experts in cloud security that will show you how to improve your threat visibility, reach your security goals, and think like an attacker. Register today!

  • Threat Intelligence & Process

    Join us for this webinar in which we will demonstrate how the right process paired with the right threat intelligence platform (TIP) are key in automating resource intensive aspects of your threat intelligence team. Discover how understanding what you are ...

MORE WEBINARS

Partner Perspectives

Iranian Hacker Indictment Reminds Us That Risks To Critical Infrastructure Are Real
Defending against the combination of human and technical exploits requires the collaboration of human and technical security defenses.

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

Data In The Cloud: What Everyone Should Know
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.